The researchers proposed other attack scenarios, including infecting a target's smartphone with sound-monitoring malware; placing a bug or infected computer or mobile device in a charging station, presentation podium, or other location where PCs are often placed; or keeping a listening device in a server room.